Detecting and Mitigating Ripple20 Vulnerabilities
Jeff Horne
Ordr and Gigamon: Network and Device Visibility
Bryan Gillson
Ordr and FIPS Certification
Russell Rice
The Six Levels of Enterprise Asset Control
Pandian Gnanaprakasam
Application & User Control
Network Control: Controlling Those Side to Side Movements
Behave You: Network Control
A Tree is Worth a Thousand Leaves
Is the BlueKeep Wormable Windows Bug the Next WannaCry?